Re: [Xen-devel] [PATCH] Re: [Xen-ia64-devel] Help? Red Hat fails, Suse/Debian both work fine

2006-03-05 Thread Kouya SHIMURA
Kouya SHIMURA writes: Hi Keir, Sorry for my ugly patch. Keir Fraser writes: Another update on this: apparently /dev/kmem is not really supported well by some vendors so we'll be changing the mmap method for this page (again) by supporting mmap() on the xsd_kva file itself

Re: [Xen-ia64-devel] [PATCH][RFC]discontig memory support

2006-04-03 Thread Kouya SHIMURA
Tristan Gingold writes: - Location of PGD. A page(swapper_pg_dir) pointed from init_mm.pgd seems to be never used. So I use this page as PGD for virtual frame_table. If someone uses this page, please tell me. At least it is referenced. You should remove these

RE: [Xen-ia64-devel] [PATCH][RFC]discontig memory support

2006-04-03 Thread Kouya SHIMURA
Hi Kevin, Thanks for your comments. Tian, Kevin writes: If you can measure the TLB miss ratio of accessing vmemmap, that could help a lot to make right choice. My guess is that the TLB miss ratio is quite worse because vmemmap(frame_table) is usually accessed only by grant table operation

Re: [Xen-ia64-devel] [PATCH][RFC]discontig memory support

2006-04-03 Thread Kouya SHIMURA
doesn't suffice at all. I will fix soon. Kouya Alex Williamson writes: On Mon, 2006-04-03 at 21:31 +0900, Kouya SHIMURA wrote: Hi xen/ia64 developers. The attached patch supports discontiguous memory. It also makes over 4GB memory available. Please comment and review. Hi

Re: [Xen-ia64-devel] [PATCH] discontig memory support

2006-04-18 Thread Kouya SHIMURA
Hi Alex, Excellent!! Thanks for testing P2M/VP kernel. That might encourage me in changeover to P2M/VP kernel. I guess that remarkable performance difference appears in VNIF. I'm very interested in how much network performance is degraded. Thanks, Kouya Alex Williamson writes: I couple

Re: [Xen-ia64-devel] Oops from loop driver on IA64

2006-04-20 Thread Kouya SHIMURA
Hi, Yamahata-san is right. After more investigation, that page is valid but the page struct is missing. Attached patch fixes this issue but I think this patch is messy. Probably it's a stopgap until P2M/VP integration. Signed-off-by: Kouya Shimura [EMAIL PROTECTED] Thanks, Kouya Isaku

[Xen-ia64-devel] [PATCH] VP model doesn't pass the whole ACPI table to dom0

2006-06-05 Thread Kouya SHIMURA
assume the ACPI tables are placed in one place contiguously. Does anyone know my assumption is correct? Thanks, Kouya Signed-off-by Kouya Shimura [EMAIL PROTECTED] 10250.patch Description: Binary data 10251.patch Description: Binary data ___ Xen-ia64

Re: [Xen-ia64-devel] [PATCH] VP model doesn't pass the whole ACPI table to dom0

2006-06-05 Thread Kouya SHIMURA
Hi Tristan, Thanks for comment. Sorry for my assumption. I revised a patch. Yeah, this is tedious... but becomes more small. :-) Kouya Signed-off-by Kouya Shimura [EMAIL PROTECTED] 10251-2.patch Description: Binary data Tristan Gingold writes: Le Lundi 05 Juin 2006 11:12, Kouya SHIMURA

Re: [Xen-ia64-devel] [PATCH] VP model doesn't pass the whole ACPI table to dom0

2006-06-07 Thread Kouya SHIMURA
. As for linux, the system which has broken EFI memory map seems to be rescued by acpi_os_map_memory function in drivers/acpi/osl.c. Thanks, Kouya Alex Williamson writes: On Tue, 2006-06-06 at 21:09 +0900, Kouya SHIMURA wrote: Hi Alex, I looked into the code about reference of ACPI table

Re: [Xen-ia64-devel] [PATCH] VP model doesn't pass the whole ACPI table to dom0

2006-06-08 Thread Kouya SHIMURA
Hi Alex, Good work! Your patch works well on the PRIMEQUEST. Now ASSIGN_DOMAIN_MACH_PAGE in dom_fw.c is redundant and the attached patch should be applied. It removes the xen console message: __assign_domain_page: mpaddr already mapped!. Thanks a lot, Kouya Signed-off-by: Kouya Shimura

[Xen-ia64-devel] [PATCH] cleanup warnings in mm.c

2006-06-14 Thread Kouya SHIMURA
Hi, This patch fixes the following warnings in mm.c. mm.c:38: warning: implicit declaration of function `alloc_domain' mm.c:38: warning: assignment makes pointer from integer without a cast mm.c:46: warning: assignment makes pointer from integer without a cast Kouya Signed-off-by: Kouya

[Xen-ia64-devel] [PATCH][RFC]copy_from/to_guest

2006-08-10 Thread Kouya SHIMURA
in order to modularise drivers. Attached patch fixes copy_from/to_guest issue for modularized netback. But I think this implementation is not beautiful. Thanks, Kouya Signed-off-by: Kouya SHIMURA [EMAIL PROTECTED] diff -r 15498beef5d8 linux-2.6-xen-sparse/arch/ia64/xen/hypervisor.c --- a/linux-2.6

[Xen-ia64-devel] [PATCH][RFC]copy_from/to_guest

2006-08-11 Thread Kouya SHIMURA
Hi, Here's a slightly revised patch. The older patch has insecurity to which a malicious guest can crack the page. I'll take a vacation and sorry for delay to reply in advance. Thanks, Kouya Signed-off-by: Kouya SHIMURA [EMAIL PROTECTED] Kouya SHIMURA writes: Hi all, This patch fixes

Re: [Xen-ia64-devel] [PATCH][RFC]copy_from/to_guest

2006-09-13 Thread Kouya SHIMURA
+0900, Kouya SHIMURA wrote: Content-Description: message body text diff -r fc6c3d866477 xen/arch/ia64/xen/vcpu.c --- a/xen/arch/ia64/xen/vcpu.c Wed Aug 09 10:32:23 2006 -0600 +++ b/xen/arch/ia64/xen/vcpu.c Fri Aug 11 18:35:31 2006 +0900 @@ -2215,3 +2215,27 @@ IA64FAULT vcpu_ptr_i

[Xen-ia64-devel] [PATCH] create page table for virtual frame table

2006-09-22 Thread Kouya SHIMURA
-off-by: Kouya SHIMURA [EMAIL PROTECTED] xenmem.patch Description: Binary data Isaku Yamahata writes: Hi. As Jes explained, p?d_populate() requires virtual address for third argument. So alloc_dir_page() should return virtual address. On the otherhand __pa(__pa(va)) == __pa(va) because

Re: [Xen-ia64-devel] sparsemem/discontig?

2006-09-22 Thread Kouya SHIMURA
Hi Jes, I checked your old mail. I might figure out your problem. Xen/IPF assumes that the location of its kernel is starting at physical address 0x400. And its virtual address must be 0xf400. Xen uses __pa() macro everywhere to get a physical address of symbol which is declared

[Xen-ia64-devel] [PATCH] revert cset 11039

2006-10-03 Thread Kouya SHIMURA
Hi, I'm grad that xencomm is applied. Attached patch reverts cset 11039. That is no longer necessary. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 6e7cc23ab18c xen/arch/ia64/xen/vcpu.c --- a/xen/arch/ia64/xen/vcpu.c Mon Oct 02 21:53:07 2006 -0600 +++ b/xen/arch/ia64

[Xen-ia64-devel] [PATCH] Xen panics when domvti is destroyed

2006-10-10 Thread Kouya SHIMURA
=f7d30de0 (XEN) (XEN) (XEN) Panic on CPU 1: (XEN) Fault in Xen. (XEN) Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 5176c3ea3293 xen/arch/ia64/xen/domain.c --- a/xen/arch/ia64/xen/domain.cSun Oct 08 18

RE: [Xen-ia64-devel] [PATCH] Xen panics when domvti is destroyed

2006-10-10 Thread Kouya SHIMURA
) { +vmx_relinquish_vcpu_resources(v); +} else relinquish_vcpu_resources(v); free_xenheap_pages(v, KERNEL_STACK_SIZE_ORDER); -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Kouya SHIMURA Sent: 2006年10月10日 18:31 To: xen

RE: [Xen-ia64-devel] [PATCH] Xen panics when domvti is destroyed

2006-10-11 Thread Kouya SHIMURA
() is called after sched_destroy_domain(). If the scheduler stops vcpus completely in sched_destroy_domain(), it might be OK. But it seems to be up to scheduler. Thanks, Kouya Xu, Anthony writes: From: Kouya SHIMURA [mailto:[EMAIL PROTECTED] Sent: 2006年10月11日 12:41 To: Xu, Anthony Cc: xen-ia64

Re: [Xen-ia64-devel] [PATCH] Xen panics when domvti is destroyed

2006-10-12 Thread Kouya SHIMURA
Hi, I'm still worried about the confliction between waking up a vcpu and destroying the domain. I'm not sure but the following modification seems to be necessary. It does the same thing as hvm_bringup_ap() in x86. LOCK_BIGLOCK might be exaggerated but at least any lock is required. If two cpu

RE: [Xen-ia64-devel] [PATCH] Xen panics when domvti is destroyed

2006-10-16 Thread Kouya SHIMURA
Hi Alex, Could you apply an attached patch? There is no difference between Anthony's patch and my old one because all vcpus are stopped completely. Thanks, Kouya Signed-off-by: Kouya SHIMURA [EMAIL PROTECTED] Signed-off-by: Anthony Xu [EMAIL PROTECTED] diff -r fcd746cf4647 xen/arch/ia64/xen

[Xen-ia64-devel] [PATCH][RFC][IA64] Accelerate IDE PIO on HVM/IA64

2006-12-03 Thread Kouya SHIMURA
__ia64__ ? * and so on. Please show me the right way. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 3bd721db6db5 tools/ioemu/hw/ide.c --- a/tools/ioemu/hw/ide.c Sun Dec 03 17:44:14 2006 + +++ b/tools/ioemu/hw/ide.c Mon Dec 04 09:30:42 2006 +0900 @@ -23,6 +23,10

[Xen-ia64-devel] Re: [PATCH][RFC][IA64] Accelerate IDE PIO on HVM/IA64

2006-12-04 Thread Kouya SHIMURA
?) Thanks, Kouya [EMAIL PROTECTED] writes: Quoting Kouya SHIMURA [EMAIL PROTECTED]: This patch significantly accelerates IDE PIO on HVM/IA64: * reduces the installation time of Windows 2003 Server from 10 hours(!) to 50min. * accelerates Windows CrashDumping speed from 40KB/sec

[Xen-ia64-devel] Re: [PATCH][RFC][IA64] Accelerate IDE PIO on HVM/IA64

2006-12-05 Thread Kouya SHIMURA
Hi, Alan Multimedia was out of my thought since my target is IA64. What a gorgeous music player it is! :) For handling inb/inw/inl, I already support inw/inl except inb. inb is processed with the previous mechanism. All I did is to move ide_data_(read|write)[wl] functions in Qemu into the

Re: [Xen-ia64-devel] eepro100 for vti (ie network under windows)

2006-12-06 Thread Kouya SHIMURA
Hi, Tristan Thank you for information. I tried it. But unfortunately it doesn't help Windows 2k3. It adds two new network card. * eepro100 * dp8381x Windows 2K3 seems to have neither drivers although NICs are recognized (I confirmed it through device manager). Thanks, Kouya Tristan Gingold

[Xen-ia64-devel] [PATCH] ptc_ga might not purge vtlb

2007-01-23 Thread Kouya SHIMURA
Hi, SMP Windows sometimes failed to boot up with BSOD. After the deep investigation, I found a bug. If VTLB hasn't been used in region 0, ptc_ga for other region doesn't purge VTLBs. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 10dd3c907ca7 xen/arch/ia64/vmx/vmmu.c

[Xen-ia64-devel] [PATCH] xen might misunderstand a normal page as I/O page

2007-01-23 Thread Kouya SHIMURA
Hi, Hypervisor might misunderstand a normal page as I/O page if a guest OS uses the ig field in the guest VHPT. It seems to be harmless but slightly slow down. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 58637a0a7c7e xen/arch/ia64/vmx/vtlb.c --- a/xen/arch/ia64/vmx

RE: [Xen-ia64-devel] [PATCH] xen might misunderstand a normal page asI/O page

2007-01-24 Thread Kouya SHIMURA
, Anthony writes: Hi Kouya, Can you explain more? How does misunderstanding happen? And how does this patch fix it? Thanks Anthony Kouya SHIMURA write on 2007年1月24日 12:31: Hi, Hypervisor might misunderstand a normal page as I/O page if a guest OS uses the ig

[Xen-ia64-devel] [PATCH] NEW_TLBFLUSH_CLOCK_PERIOD_SOFTIRQ is not registered.

2007-01-26 Thread Kouya SHIMURA
Hi NEW_TLBFLUSH_CLOCK_PERIOD_SOFTIRQ is used but not registered. I've never experienced but system will panic in the very long run. I wonder why Isaku missed it. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r b4df7de0cbf7 xen/arch/ia64/xen/xensetup.c --- a/xen/arch/ia64

Re: [Xen-ia64-devel] [PATCH] NEW_TLBFLUSH_CLOCK_PERIOD_SOFTIRQ is notregistered.

2007-01-29 Thread Kouya SHIMURA
Hi, Isaku Yamahata writes: Kouya SHIMURA write on 2007年1月26日 19:06: Hi NEW_TLBFLUSH_CLOCK_PERIOD_SOFTIRQ is used but not registered. I've never experienced but system will panic in the very long run. I wonder why Isaku missed it. Ouch! It doesn't cause panic

[Xen-ia64-devel] [PATCH] bug fix new_tlbflush_clock_period()

2007-02-01 Thread Kouya SHIMURA
Hi, __vhpt_flush() might be called from new_tlbflush_clock_period() even if the vcpu doesn't have the per-vcpu-vhpt. It erases 64KB memory content that starts from machine address 0. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 0df9dc2f1d03 xen/arch/ia64/xen/flushtlb.c

Re: [Xen-ia64-devel][PATCH]Change tlbflush_clock to 64bit

2007-02-06 Thread Kouya SHIMURA
Xu, Anthony writes: Change tlbflush_clock to 64bit, Hi Anthony, I don't think that the expansion to 64bit of tlbflush_clock is good idea. If it is extended, tlbflush_timestamp in struct page_info should be extended also. see xen/common/page_alloc.c IMHO, to keep page_info small is more

[Xen-ia64-devel] [PATCH] Fix wrong arg to vhpt_enabled() in vmx_hpw_miss()

2007-02-06 Thread Kouya SHIMURA
We have never hit a bug but it is obviously wrong. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r fbc128aafdeb xen/arch/ia64/vmx/vmx_process.c --- a/xen/arch/ia64/vmx/vmx_process.c Sun Feb 04 12:24:53 2007 -0700 +++ b/xen/arch/ia64/vmx/vmx_process.c Tue Feb 06 18:43:42

[Xen-ia64-devel] [PATCH] fix ID cache incoherency after vcpu migration

2007-02-13 Thread Kouya SHIMURA
on SMP environment call PAL_CACHE_FLUSH simultaneously. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 8bdbe88e422f xen/arch/ia64/xen/domain.c --- a/xen/arch/ia64/xen/domain.cMon Feb 12 10:10:37 2007 -0700 +++ b/xen/arch/ia64/xen/domain.cTue Feb 13 19:18:19

Re: [Xen-ia64-devel] [PATCH] fix ID cache incoherency after vcpu migration

2007-02-14 Thread Kouya SHIMURA
:15 +0900, Kouya SHIMURA wrote: +static void flush_cache_for_context_switch(struct vcpu *next) +{ + extern cpumask_t cpu_cache_coherent_map; + int cpu = smp_processor_id(); + + if (is_idle_vcpu(next) || + __test_and_clear_bit(cpu, next

[Xen-ia64-devel] [PATCH 0/3][IA64] Accelerate IDE PIO on HVM/IA64

2007-02-27 Thread Kouya SHIMURA
Hi, This set of patches remarkably accelerates IDE PIO on HVM/IA64. I got a throughput of 2.11MB/sec in disk read performance. Without it, it was only 64kB/sec. I posted the prototype once. http://lists.xensource.com/archives/html/xen-devel/2006-12/msg00077.html The basic idea is to add a

[Xen-ia64-devel] [PATCH 2/3][IA64] Accelerate IDE PIO on HVM/IA64 : tools

2007-02-27 Thread Kouya SHIMURA
2/3 add one more page to the guest for IDE PIO. Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 2d3ceb082114 tools/libxc/ia64/xc_ia64_hvm_build.c --- a/tools/libxc/ia64/xc_ia64_hvm_build.c Mon Feb 26 09:13:50 2007 + +++ b/tools/libxc/ia64/xc_ia64_hvm_build.c Tue Feb 27 13:27

[Xen-ia64-devel] [PATCH 3/3][IA64] Accelerate IDE PIO on HVM/IA64 : ia64

2007-02-27 Thread Kouya SHIMURA
3/3 add a bufferring mechanism for IDE PIO in a hypervisor. Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 2d3ceb082114 xen/arch/ia64/vmx/mmio.c --- a/xen/arch/ia64/vmx/mmio.c Mon Feb 26 09:13:50 2007 + +++ b/xen/arch/ia64/vmx/mmio.c Tue Feb 27 13:27:24 2007 +0900 @@ -136,6 +136,56

[Xen-ia64-devel] Re: [Xen-devel] Re: [PATCH 0/3][IA64] Accelerate IDE PIO on HVM/IA64

2007-02-27 Thread Kouya SHIMURA
the responsibility to flush the dirty buffer. I might have to consider save/restore of hvm. That is a future work. Thanks, Kouya Alex Williamson writes: On Tue, 2007-02-27 at 18:34 +0900, Kouya SHIMURA wrote: Hi, This set of patches remarkably accelerates IDE PIO on HVM/IA64. I got

[Xen-ia64-devel] [PATCH] change layout of p2m table from xenheap to domheap

2007-03-12 Thread Kouya SHIMURA
table is allocated in xenheap. I dare to change the default for the future. If there are no objections, please apply. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 9fbaf07d3f67 xen/arch/ia64/xen/mm.c --- a/xen/arch/ia64/xen/mm.cThu Mar 08 09:50:25 2007 -0700 +++ b/xen

[Xen-ia64-devel] [PATCH] fix access rights in VHPT when itr.ar!=dtr.ar

2007-03-20 Thread Kouya SHIMURA
crashes with the message 'PANIC_STACK_SWITCH' owing to this interruption. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 1584263f9fc5 xen/arch/ia64/vmx/vmx_process.c --- a/xen/arch/ia64/vmx/vmx_process.c Thu Mar 15 09:04:23 2007 -0600 +++ b/xen/arch/ia64/vmx/vmx_process.c

RE: [Xen-ia64-devel] [PATCH] fix access rights in VHPT whenitr.ar!=dtr.ar

2007-03-21 Thread Kouya SHIMURA
Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Kouya SHIMURA Sent: 2007年3月20日 16:33 To: xen-ia64-devel@lists.xensource.com Subject: [Xen-ia64-devel] [PATCH] fix access rights in VHPT whenitr.ar!=dtr.ar Hi, This is a workaround patch for Windows 2003

RE: [Xen-ia64-devel][Patch]Add two PAL calls which fix SMP windowsinstallation crashing bug

2007-03-26 Thread Kouya SHIMURA
Hi, I also solved it without new GFW. This patch is a little bit dirty hacking. Should I wait for new GFW? Thanks, Kouya Zhang, Xing Z writes: Yes, it can fix. But it should work with new GFW. We will send it out soon. Good good study,day day up ! ^_^ -Wing(zhang xin) OTC,Intel

[Xen-ia64-devel] [PATCH] bug fix. avoid insertion of pte.ma=001 into VHPT

2007-03-28 Thread Kouya SHIMURA
A TLB entry shouldn't be inserted into VHPT when its memory attribute field is 001 software reserved. Without this patch, a TLB fault expected by a guest OS is missing. -- Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 14aeb7981e4e xen/arch/ia64/vmx/vmx_process.c --- a/xen/arch

RE: [Xen-ia64-devel] [PATCH] bug fix. avoid insertion of pte.ma=001into VHPT

2007-03-29 Thread Kouya SHIMURA
Hi Anthony, HPW can't work with 001 attribute even in native environment. See SDM Vol.2 Part II. 5.5 Subpaging. Currently Xen masks a memory attribute and inserts it into VHPT in thash_purge_and_insert(). So HPW works wrongly. Thanks, Kouya Xu, Anthony writes: Kouya SHIMURA write on 2007年3月

RE: [Xen-ia64-devel] [PATCH] bug fix. avoid insertion of pte.ma=001into VHPT

2007-04-01 Thread Kouya SHIMURA
(v); return IA64_FAULT; } I think it is better to add logic of checking vpsr.ic. thanks, anthony Kouya SHIMURA write on 2007年3月30日 8:50: Hi Anthony, HPW can't work with 001 attribute even in native environment. See SDM Vol.2 Part

RE: [Xen-ia64-devel][Patch]Add two PAL calls which fix SMPwindowsinstallation crashing bug

2007-04-04 Thread Kouya SHIMURA
Hi Alex, Wing, I revised my patch(return to SAL). What do you think? This is still dirty since it uses the rest area of HOB. Is there any other good place for SAL_RETURN_STUB_PADDR? Thanks, Kouya Alex Williamson writes: Can this be combined with Tristan's approach for HVM vCPU hotplug

RE: [Xen-ia64-devel][Patch]Add two PAL calls which fix SMPwindowsinstallation crashing bug

2007-04-04 Thread Kouya SHIMURA
Hi Tristan, Alex, Wing, [EMAIL PROTECTED] writes: IMHO the Intel GFW can do all this work, there is no needs to do it in the hypervisor. I read Tristan's GFW roughly. It seem to be already resolved in Tristan's GFW. The following is my understanding. GFW has a stub function

Re: [Xen-ia64-devel][Patch]Add two PAL calls which fix SMPwindowsinstallation crashing bug

2007-04-04 Thread Kouya SHIMURA
Tristan Gingold writes: In 10, I don't understand why the special SAL_XEN_SAL_RETURN is necessary instead of PAL_HALT. The difference is test_and_set_bit() or set_bit(). I think a vcpu with VCPU_down state never be at this point. Besides calling vcpu_sleep_no_sync() with VCPU_down

RE: [Xen-ia64-devel][Patch]Add two PAL calls which fixSMPwindowsinstallation crashing bug

2007-04-05 Thread Kouya SHIMURA
. En, maybe something I lost, hope your comments. Good good study,day day up ! ^_^ -Wing(zhang xin) OTC,Intel Corporation -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Kouya SHIMURA Sent: 2007

[Xen-ia64-devel] [PATCH] fix initial value of cr.pta

2007-04-05 Thread Kouya SHIMURA
The initial value of cr.pta in a vcpu is zero. So a Reserved Register/Field fault is raised if a guest executes the following sequence. mov r2=cr.pta;; ... mov cr.pta=r2 Actually, the windows installer with vcpus=3 crashes due to this issue. -- Kouya Signed-off-by: Kouya Shimura

[Xen-ia64-devel] [PATCH] fix ptc.ga emulation

2007-04-13 Thread Kouya SHIMURA
vrr[0] of vcpu2 // the new value is lost Windows will crash due to this issue. -- Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 41471cc650a2 xen/arch/ia64/vmx/vmmu.c --- a/xen/arch/ia64/vmx/vmmu.c Thu Apr 12 10:30:12 2007 -0600 +++ b/xen/arch/ia64/vmx/vmmu.c Fri Apr 13 20:55:11

[Xen-ia64-devel] [PATCH] fix ptc.ga emulation

2007-05-13 Thread Kouya SHIMURA
. -- Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 4ca4374eabd5 xen/arch/ia64/vmx/vmmu.c --- a/xen/arch/ia64/vmx/vmmu.c Fri May 11 13:15:53 2007 -0600 +++ b/xen/arch/ia64/vmx/vmmu.c Mon May 14 12:04:04 2007 +0900 @@ -563,11 +563,17 @@ struct ptc_ga_args { static void

[Xen-ia64-devel] [PATCH] fix deadlock of ptc.ga emulation

2007-05-16 Thread Kouya SHIMURA
Sorry, my previous patch implies a bug. ptc_ga_remote_func() might be invoked by IPI with a schedule_lock that is acquired. (e.g., inside of vcpu_migrate()) It will cause a deadlock. -- Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 94cce9a51540 xen/arch/ia64/vmx/vmmu.c --- a/xen

[Xen-ia64-devel] [PATCH] fix ld.s emulation

2007-05-22 Thread Kouya SHIMURA
Hi, With this patch, * XEN correctly emulates ld.s for HVM * original memory attribute is preserved in vcpu-arch.vtlb Without this, XEN infrequently calls panic_domain() by mistake for windows. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] Signed-off-by: Akio Takebe [EMAIL

[Xen-ia64-devel] [PATCH] remove an annoying log message

2007-05-30 Thread Kouya SHIMURA
This patch removes an annoying log message (XEN) ia64_handle_reflection: handling lowerpriv trap -- Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 2b14a1f22eec xen/arch/ia64/xen/faults.c --- a/xen/arch/ia64/xen/faults.cFri May 25 09:43:21 2007 -0600 +++ b/xen/arch/ia64/xen

[Xen-ia64-devel] [PATCH] Fix HVM boot failure

2007-06-05 Thread Kouya SHIMURA
HVM sometimes fails to boot with the message Guest nested fault vector=0x5400!. The cause of this issue is that cr.ifs never be initialized in very first context switching. To optimize hypercall on HVM, cr.ifs is only set with the predicate pNonSys(pr5)=1. -- Kouya Signed-off-by: Kouya Shimura

Re: [Xen-ia64-devel] [PATCH] Fix HVM boot failure

2007-06-06 Thread Kouya SHIMURA
Hi Tristan, I don't think so. Since vcpu_init_regs() set virtual registers which belong to a vcpu. On the other hand, this patch initializes real register which belongs to XEN. Thanks, Kouya [EMAIL PROTECTED] writes: Quoting Kouya SHIMURA [EMAIL PROTECTED]: HVM sometimes fails to boot

RE: [Xen-ia64-devel] [PATCH] Fix vmx_vcpu_thash()

2007-06-11 Thread Kouya Shimura
Hi, In guest Linux and Windows using short format VHPT, there is no performance degradation for this patch. So I wish it to be applied. (and besides my machine's PAL is 8.09) Even on latest PAL, the following patch is needed. if(vpta.vf){ pval = ia64_call_vsa(PAL_VPS_THASH, vadr,

[Xen-ia64-devel] [PATCH] Emulate ACPI in hypervisor

2007-06-14 Thread Kouya Shimura
-by: Kouya Shimura [EMAIL PROTECTED] # HG changeset patch # User Kouya Shimura [EMAIL PROTECTED] # Date 1181823223 -32400 # Node ID 0b2708362260932a13f7d8c5a33f875bf6b1 # Parent 96331db61e47065da5d374a9ec432d6837aaf5af Revive ACPI power management for IA64. c/s 14552 took PM1a_EVT_BLK registers

Re: [Xen-ia64-devel] Question to frametable_miss()

2007-06-19 Thread Kouya Shimura
Hi Dietmar, I wrote this code. There is no speical reason except for my debugging. Currently the value should be 0. If Xen uses protection keys, the value must follow it too. Thanks, Kouya Dietmar Hahn writes: Hi, currently I'am looking at the code to bring in protection key support in

[Xen-ia64-devel] [PATCH] speedup ptc.e emulation

2007-07-13 Thread Kouya Shimura
Hi, This patch makes ptc.e emulation faster. It defers the initialization of collision chain area of VHPT. Also removes an unused field from struct thash_cb. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 40608e5e394e xen/arch/ia64/vmx/vtlb.c --- a/xen/arch/ia64/vmx

Re: [Xen-ia64-devel] [PATCH] speedup ptc.e emulation

2007-07-16 Thread Kouya Shimura
Previously it took 13msecs to emulate a ptc.e instruction. This patch saves 4msecs though it's still slow. Windows uses ptc.e so often. we got 8% gain in TTCP (network benchmark) on Windows guest with this change. Thanks, Kouya Alex Williamson writes: On Fri, 2007-07-13 at 19:01 +0900, Kouya

[Xen-ia64-devel] [PATCH] fix swiotlb_dma_supported

2007-07-24 Thread Kouya Shimura
CD/DVD-ROM on recent Dom0 is not available. After some investigation, IDE controller is disabled by reason that io_tlb_end is out of bounds. Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r bf38300f5e63 arch/ia64/xen/swiotlb.c --- a/arch/ia64/xen/swiotlb.c Sun Jul 15 13:48:57 2007 -0600

[Xen-ia64-devel] [PATCH] cleanup: remove useless code

2007-08-03 Thread Kouya Shimura
Remove useless code. Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 039f2ccb1e38 xen/arch/ia64/vmx/mmio.c --- a/xen/arch/ia64/vmx/mmio.c Tue Jul 31 10:30:40 2007 -0600 +++ b/xen/arch/ia64/vmx/mmio.c Fri Aug 03 18:00:02 2007 +0900 @@ -270,11 +270,9 @@ static void legacy_io_access(VCPU

[Xen-ia64-devel] [PATCH] make MMU setting of domVTi configurable

2007-08-10 Thread Kouya Shimura
Hi, This patch makes MMU setting of domVTi configurable. The size of VTLB and VHPT can be set by boot option. (e.g. vti_vtlb_size=256k vti_vhpt_size=1m) Also some cleanups. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r cc83df4c96d6 xen/arch/ia64/vmx/vmmu.c --- a/xen

Re: [Xen-ia64-devel] [PATCH] make MMU setting of domVTi configurable

2007-08-12 Thread Kouya Shimura
% down) Emulating ptc_e is the villain of the piece for Windows. We'll continue to tune up. Thanks, Kouya Alex Williamson writes: On Fri, 2007-08-10 at 18:23 +0900, Kouya Shimura wrote: Hi, This patch makes MMU setting of domVTi configurable. The size of VTLB and VHPT can be set

[Xen-ia64-devel] [PATCH] shrink vtlb size

2007-08-15 Thread Kouya Shimura
) thash_purge_all entries:16 collisions:0 1 (XEN) thash_purge_all entries:21 collisions:0 Thanks, Kouya Singed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r cd51fa91956b xen/arch/ia64/vmx/vtlb.c --- a/xen/arch/ia64/vmx/vtlb.c Sun Aug 12 14:50:02 2007 -0600 +++ b/xen/arch/ia64/vmx/vtlb.c Wed Aug 15

[Xen-ia64-devel] Re: [Xen-devel] ANNOUNCE: Xen 3.1.1 First Release Candidate

2007-09-21 Thread Kouya Shimura
) ___ Xen-devel mailing list [EMAIL PROTECTED] http://lists.xensource.com/xen-devel # HG changeset patch # User Kouya Shimura [EMAIL PROTECTED] # Date 1190350719 -32400 # Node ID da7784dd34f5e85b62023d35c8c9d618b78647ac # Parent

Re: [Xen-ia64-devel] Open GFW Howto

2007-09-25 Thread Kouya Shimura
Hi Wing, Thank you for your contribution. I'd like to switch to open GFW too. But there is an obstruction. Open GFW seems not to support legacy VGA bios. So Windows can't utilize cirrus logic video card and the display of qemu console is very poor (640x480 16colors) and slow. Do you have any

[Xen-ia64-devel] [PATCH] fix wrong insertion of TLB entry in region 0

2007-10-01 Thread Kouya Shimura
0. Actually I met the crash when I was building open GFW (java uses region 0). -- Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 83239b289072 xen/arch/ia64/xen/regionreg.c --- a/xen/arch/ia64/xen/regionreg.c Thu Sep 27 16:29:43 2007 -0600 +++ b/xen/arch/ia64/xen/regionreg.c

Re: [Xen-ia64-devel] [PATCH] fix wrong insertion of TLB entry in region 0

2007-10-01 Thread Kouya Shimura
= vmMangleRID(newrrv.rrval); /// this is the case of metaphysical_mode. if (!PSCB(v,metaphysical_mode)) set_rr(rr,newrrv.rrval); /// namely, set_one_rr does nothing. ... } -- Kouya [EMAIL PROTECTED] writes: Quoting Kouya Shimura [EMAIL PROTECTED]: On PV

[Xen-ia64-devel] [PATCH] Fix TLB insertion for subpaging

2007-10-11 Thread Kouya Shimura
Without this patch, Longhorn is sure to hang up. .NET application might hit this bug. itc.i instruction is repeated forever, because TLB entry with smaller page size is volatile. -- Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] subpaging.patch Description: Binary data

[Xen-ia64-devel] [PATCH][GFW] fix unalignment ref with gcc 4.x

2007-10-15 Thread Kouya Shimura
Hi Tristan, The attached patch fix unalignment reference with gcc 4.x. I tested the binary built with gcc 4.1.1 works fine. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 8ecccd88813c edk2-sparse/EdkXenPkg/Cpu/Itanium/Timer/Dxe/Timer.c --- a/edk2-sparse/EdkXenPkg/Cpu

[Xen-ia64-devel] [PATCH][GFW] support windows 2008

2007-10-15 Thread Kouya Shimura
identity mappping. - ignoring unaligned reference exception when it is speculated. If there is no problem, please apply. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 8ecccd88813c edk2-sparse/EdkXenPkg/SecMain/Ipf/startup.s --- a/edk2-sparse/EdkXenPkg/SecMain/Ipf/startup.s

[Xen-ia64-devel] [PATCH][IA64] configure VHPT size per HVM domain

2007-10-16 Thread Kouya Shimura
flushing, that becomes an overhead. This patch is significant for IA64 to support both linux guest and windows guest simultaneously. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 2863852e02f6 tools/examples/xmexample.vti --- a/tools/examples/xmexample.vti Mon Oct 15 11

Re: [Xen-devel] Re: [Xen-ia64-devel] [PATCH][IA64] configure VHPT size per HVM domain

2007-10-16 Thread Kouya Shimura
Hi Yamahata-san, I'm now thinking about PV domain. Please stay tuned. As I mentioned before, vTLB is already minimum size(16KB) and no collision for windows. http://lists.xensource.com/archives/html/xen-ia64-devel/2007-08/msg00108.html So I feel it's enough about vTLB. If smaller vTLB size is

[Xen-ia64-devel] [PATCH 2/2][IA64] configure VHPT size per domain: ia64 part

2007-10-18 Thread Kouya Shimura
IA64 part. Signed-off-by: Kouya Shimura [EMAIL PROTECTED] # HG changeset patch # User Kouya Shimura [EMAIL PROTECTED] # Date 1192770850 -32400 # Node ID 630a8cf763c0a00766ea2c5528ad148740edad8a # Parent b4278beaf3549f410a5a6086dbd8af93c495aeac IA64 part. diff -r b4278beaf354 -r 630a8cf763c0

[Xen-ia64-devel] [PATCH 0/2][IA64] configure VHPT size per domain

2007-10-18 Thread Kouya Shimura
will be that you will set the new HVM parameter in IA64_HVM_ImageHandler.buildDomain(), rather than passing the new parameter down to xc.hvm_build(). -- Keir On 16/10/07 07:21, Kouya Shimura [EMAIL PROTECTED] wrote: Hi Keir and Alex, A Virtual Hash Page Table(VHPT) is a special

[Xen-ia64-devel] [PATCH 1/2][IA64] configure VHPT size per domain: common part

2007-10-18 Thread Kouya Shimura
common part. Signed-off-by: Kouya Shimura [EMAIL PROTECTED] # HG changeset patch # User Kouya Shimura [EMAIL PROTECTED] # Date 1192770562 -32400 # Node ID 4b8752eccee77c2a3ef20f58bcc1c935dd80865a # Parent b4278beaf3549f410a5a6086dbd8af93c495aeac common part. diff -r b4278beaf354 -r

[Xen-ia64-devel] [PATCH][IA64] fix configure VHPT size per domain

2007-10-22 Thread Kouya Shimura
Hi Keir, Sorry, my patch (cset 16136, configure VHPT size per domain for IA64) was a little bit kludge and implies a bug. PV domain can't boot up in some VHPT size. Please apply the attached patch. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 98ac6d05aed2 tools/libxc

[Xen-ia64-devel] [PATCH] Enable dbr for VTi domain

2007-10-24 Thread Kouya Shimura
Enable dbr for VTi domain. -- Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 359484cee7d9 xen/arch/ia64/vmx/vmx_virt.c --- a/xen/arch/ia64/vmx/vmx_virt.c Wed Oct 24 11:18:42 2007 -0600 +++ b/xen/arch/ia64/vmx/vmx_virt.c Thu Oct 25 09:05:10 2007 +0900 @@ -939,7 +939,6

[Xen-ia64-devel] [PATCH] update pal.h and pal.S to linux-2.6.21

2007-10-31 Thread Kouya Shimura
Hi, Current pal.h is based on linux-2.6.13 and some procedures are missing. (e.g. PAL_GET_PSTATE) This patch just updates pal.h and pal.S to linux-2.6.21. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r a07288a84785 xen/arch/ia64/linux-xen/README.origin --- a/xen/arch

[Xen-ia64-devel] [PATCH] implement some PAL procedures

2007-10-31 Thread Kouya Shimura
Hi, This patch implements: - PAL_PREFETCH_VISIBILITY - PAL_MC_DRAIN - PAL_BRAND_INFO - PAL_GET_PSTATE - PAL_CACHE_SHARED_INFO Abobe PAL procedures are necessary for Windows 2008. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r a07288a84785 xen/arch/ia64/xen/fw_emul.c

[Xen-ia64-devel] [PATCH] Cleanup: remove unused fields from struct arch_domain

2007-11-06 Thread Kouya Shimura
remove unused fields from struct arch_domain. -- Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 650cadd1b283 xen/include/asm-ia64/domain.h --- a/xen/include/asm-ia64/domain.h Fri Nov 02 16:38:11 2007 + +++ b/xen/include/asm-ia64/domain.h Tue Nov 06 16:55:08 2007 +0900

[Xen-ia64-devel] [PATCH] Simplify thash_purge_and_insert()

2007-11-06 Thread Kouya Shimura
Hi, This patch simplifies thash_purge_and_insert() for readability. PV domain never use this function. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r a071725bda88 xen/arch/ia64/vmx/vtlb.c --- a/xen/arch/ia64/vmx/vtlb.c Tue Nov 06 14:20:05 2007 -0700 +++ b/xen/arch/ia64

Re: [Xen-ia64-devel] E100 emulator is ready

2007-11-14 Thread Kouya Shimura
Hi Wing, Great work! IA64 Windows finally can be practical widely by your effort. Thank you. Immediately I tried it on Longhorn with stars in my eyes. Unfortunately, Longhorn RC0 seems not to have e100 driver... Thanks, Kouya Zhang, Xing Z writes: Hi All: I am sorry I spent so long a

RE: [Xen-ia64-devel] E100 emulator is ready

2007-11-15 Thread Kouya Shimura
Hi Wing, I succeeded in installing the windows2003's e100 driver on Longhorn. Your suggestion doesn't work well. The driver updater complains lack of some file. e100b645.sys and net557.inf are not enough. I installed the driver as follows: (1) download e100 driver(PROWS64.exe) from intel site.

Re: [Xen-ia64-devel] Open GFW Howto

2007-11-22 Thread Kouya Shimura
Hi Amy and Tristan, I've tried to build OGFW in the following config: kernel: 2.6.18-52.el5 RHEL5.1 build-in gcc: 4.1.2-14 RHEL5.1 build-in binutils: 2.17.50.0.6-5.el5 jrockit-R27.3.1-jdk1.5.0_11-linux-ipf Apache-ant-1.6.5 Ant-contrib-1.0b2 Saxonb8-1-1 Xmlbeans-2.1.0 The generated

RE: Re: [Xen-ia64-devel] Open GFW Howto

2007-11-27 Thread Kouya Shimura
Hi Alex, Yes, I think we should. This bug is quite serious. Additionally I recommend: http://xenbits.xensource.com/xen-unstable.hg?rev/52d9f5028397 Guest Windows might hang due to this bug. Thanks, Kouya Alex Williamson writes: On Thu, 2007-11-22 at 10:49 +0900, Kouya Shimura wrote

[Xen-ia64-devel] [OGFW][PATCH] Fix alignment

2007-11-27 Thread Kouya Shimura
Hi Tristan, If you would like an attached patch, please apply it. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] Tristan Gingold writes: I have commented out the call to check_regs. If you have a better patch, I will be happy to apply it. Tristan. diff -r ff6062288399

[Xen-ia64-devel] [PATCH] Fix vulnerability of copy_to_user in PAL emulation

2007-12-10 Thread Kouya Shimura
address 0x108000. This is a serious problem. I tried to support PV domain with the same logic too but it doesn't work well since PV domain can't hold more than one vtlb. Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 4054cd60895b xen/arch/ia64/vmx/pal_emul.c --- a/xen/arch/ia64/vmx/pal_emul.c

Re: [Xen-ia64-devel] [PATCH] Fix vulnerability of copy_to_user in PAL emulation

2007-12-11 Thread Kouya Shimura
Hi Tristan, This is a workaround patch for xen-3.2. I agree with you that xencomm-izing is a better solution. I'll be happy to revert my patch after the xencommized version will be applied. Thanks, Kouya [EMAIL PROTECTED] writes: I think your solution is not the right approach. We already

Re: [Xen-ia64-devel] [PATCH] Fix vulnerability of copy_to_user in PAL emulation

2007-12-11 Thread Kouya Shimura
Hi Alex, Thank you for reviewing. I updated the patch as your comments. please apply. I also long for a xencomm. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] Alex Williamson writes: I think there's a off by one issue as noted below. Also a few cleanups. Like Tristan

Re: [Xen-ia64-devel] [PATCH] Fix vulnerability of copy_to_user in PAL emulation

2007-12-11 Thread Kouya Shimura
,IA64_DATA_TLB_VECTOR) If vcpu_increment_iip(v) is unconditionally called, IIP wrongly points to the address 0x801(IA64_DATA_TLB_VECTOR+1). Thanks, Kouya Isaku Yamahata writes: On Wed, Dec 12, 2007 at 02:12:41PM +0900, Isaku Yamahata wrote: On Wed, Dec 12, 2007 at 01:07:13PM +0900, Kouya Shimura wrote: diff

[Xen-ia64-devel] [PATCH][TAKE3] Fix vulnerability of copy_to_user in PAL emulation

2007-12-13 Thread Kouya Shimura
, that would avoid the vulnerability. Thanks, Kouya Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 19c2b6d2930c xen/arch/ia64/xen/fw_emul.c --- a/xen/arch/ia64/xen/fw_emul.c Thu Dec 13 09:34:49 2007 -0700 +++ b/xen/arch/ia64/xen/fw_emul.c Fri Dec 14 15:30:20 2007 +0900 @@ -37,6 +37,7

[Xen-ia64-devel] [PATCH] Fix vmx_asm_thash

2007-12-14 Thread Kouya Shimura
It must be typo. Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 19c2b6d2930c xen/arch/ia64/vmx/optvfault.S --- a/xen/arch/ia64/vmx/optvfault.S Thu Dec 13 09:34:49 2007 -0700 +++ b/xen/arch/ia64/vmx/optvfault.S Fri Dec 14 17:10:46 2007 +0900 @@ -468,7 +468,7 @@ vmx_asm_thash_back1

[Xen-ia64-devel] [PATCH] Fix security vulnerability

2008-01-14 Thread Kouya Shimura
DomU can map any other domain's memory. Signed-off-by: Kouya Shimura [EMAIL PROTECTED] diff -r 45d16899a21d xen/arch/ia64/xen/dom0_ops.c --- a/xen/arch/ia64/xen/dom0_ops.c Sun Jan 13 10:50:18 2008 + +++ b/xen/arch/ia64/xen/dom0_ops.c Tue Jan 15 15:39:17 2008 +0900 @@ -522,10

Re: [Xen-ia64-devel] [PATCH] Fix security vulnerability

2008-01-14 Thread Kouya Shimura
Isaku Yamahata writes: On Tue, Jan 15, 2008 at 03:52:45PM +0900, Kouya Shimura wrote: DomU can map any other domain's memory. What about add_io_space and un/expose_foreign_p2m? I'm not sure they are breakable. At first, I wrote the following patch. But domU never boot. (do_dom0vp_op

  1   2   >